DefusedCyber Profile Banner
Defused Profile
Defused

@DefusedCyber

Followers
3K
Following
607
Media
155
Statuses
363

Real-Time Threat Intelligence via Cyber Deception. Start Building for Free: https://t.co/TTnxgi9Hv5

Joined August 2023
Don't wanna be here? Send us removal request.
@DefusedCyber
Defused
21 hours
⚠️Actor mass exploiting unknown Fortinet exploit (FortiWeb path traversal / API exploitation) from 107.152.41.19 πŸ‡ΊπŸ‡Έ ( TZULO ) VirusTotal Detections 0/95 🟒 After the exploit, the actor attempted to login using the newly created username-credential pair πŸ”
2
14
53
@DefusedCyber
Defused
3 hours
⚠ Multiple IPs mass exploiting unknown Fortinet exploit (FortiWeb path traversal / API exploitation) The exploit aims at creating a user with the user-password combination Testpoint:AFT3$tH4ckmet0d4yaga!n πŸ” IPs involved in this exploit: 185.192.70.39 185.192.70.55
0
3
6
@SimoKohonen
Simo
6 hours
Some heightened activity on WSUS / CVE-2025-59287 during the last few days, put one of the payloads into a gist if someone is interested: https://t.co/ttzcTuh9V4
0
9
16
@DefusedCyber
Defused
3 days
Patching Motivation of the Day πŸ‘‡ Actor repeatedly hammering the CVE-2025-25257 exploit onto our Fortiweb honeypots with a DROP TABLE payload 213.209.143.41 just wants to watch the world burn! πŸ”₯
0
4
21
@DefusedCyber
Defused
4 days
Check the full ransomware vulnerabilities list πŸ‘‰ https://t.co/u6qdjtw4Kt
0
2
4
@DefusedCyber
Defused
4 days
Ransomware vulns with highest exploit likelihood ⬆️ (past 30d): - CVE-2025-61882 (Oracle E-Busine..) +186086.05% - CVE-2021-27877 (Veritas Veritas..) +879.54% - CVE-2023-20269 (ASA..) +302.13% - CVE-2023-20269 (FTD..) +302.13% - CVE-2025-29824 (CLFS..) +289.16%
1
16
66
@SimoKohonen
Simo
6 days
Weekend of the F5 exploits... seeing like a 5-10x rate of exploitation to normal in the past 24 hrs Some actor is spraying known exploits like crazy (even old ones like CVE-2020-5902) @GreyNoiseIO has an interesting wpaper about how exploit spikes can predict new CVEs πŸ‘‡
1
9
32
@UK_Daniel_Card
mRr3b00t
7 days
Cybercrime identified by @DefusedCyber
1
1
5
@DefusedCyber
Defused
7 days
🚨Major exploit sweep targetting F5 BIG-IP ongoing A set of 10 IP addresses exploited CVE-2022-1388 on multiple of our F5 honeypots within the span of an hour F5 was recently breached, with breached data including previously unknown software vulnerabilities. Large-scale
0
19
52
@DefusedCyber
Defused
7 days
Actor exploiting CVE-2023-27997 (Fortinet buffer overflow) from 170.247.220.25 πŸ‡ΊπŸ‡Έ ( My Tech ) VirusTotal Detections: 0/95 🟒 This actor was recently mass probing Palo Alto devices for authentication pathways 🍯
0
4
25
@AtomicsonaFri
AtomicsonaFriday
7 days
πŸŽƒ Going live in 30 minutes! Atomics on a Friday: Night of the Living Indicators - join us for live emulations, haunted artifacts, and MCP mayhem. See you there… or on the recording. πŸ‘»βš›οΈ Twitch: https://t.co/54yXPSVO42 X Linkedin YT:
0
4
7
@DefusedCyber
Defused
8 days
A couple more days to deploy a FortiWeb decoy / honeypot for FREE πŸ‘‰ https://t.co/GXFaqghsXI New tiers launching next week 🍯
0
1
3
@DefusedCyber
Defused
8 days
Actor exploiting CVE-2025-25257 (FortiWeb SQLi) from 172.96.141.66 πŸ‡ΊπŸ‡Έ (RELIABLESITE) VT Detections: 0/95 🟒 Payload in Authorization: Bearer header πŸ“Έ select/**/a/**/from/**/fabric_user.a/**/into/**/outfile/**/var/log/lib/python3.10/pylab.py'/**/FIELDS/**/ESCAPED/**/BY/**/
1
6
20
@UK_Daniel_Card
mRr3b00t
8 days
Baddies using infra hosted in the USA to attack CISCO ASAs! (thanks @DefusedCyber and @ipinfo )
@SimoKohonen
Simo
9 days
A large scale sweep targetting Palo Alto (/global-protect/prelogin.esp & /ssl-vpn/prelogin.esp) This is recon activity used in MFA bypass attempts if I'm not mistaken. 170.247.220.25 143.137.166.65 170.247.222.234 170.231.251.212 All clean IPs from VT / GN
2
1
25
@SimoKohonen
Simo
9 days
A large scale sweep targetting Palo Alto (/global-protect/prelogin.esp & /ssl-vpn/prelogin.esp) This is recon activity used in MFA bypass attempts if I'm not mistaken. 170.247.220.25 143.137.166.65 170.247.222.234 170.231.251.212 All clean IPs from VT / GN
1
12
46
@DefusedCyber
Defused
9 days
Other activity from the same actor
@DefusedCyber
Defused
11 days
Actor exploiting multiple F5 BIG-IP vulnerabilities from 208.123.119.118 πŸ‡ΊπŸ‡Έ ( SHOCK-1 ) VirusTotal Detections 0/95 🟒 The actor exploited CVE-2022-1388, CVE-2023-46747 and attempted to afterwards access F5 Local Traffic Management (LTM) components 🚨
0
0
2
@DefusedCyber
Defused
9 days
How attackers rapidly switch IP addresses during exploits πŸ‘‡ This attacker exploits CVE-2023-46747 to add an admin account to a F5 BIG-IP honeypot, and immediately logs on from a different IP address using the new credentials 185.167.60.154 πŸ‡«πŸ‡· ( LIMESTONENETWORKS ) VT 0/95 🟒
1
4
13
@SimoKohonen
Simo
10 days
Dataset of 81k Cisco exploit (login bruteforce / CVE-2022-20759) attempts from past 7 days IPS associated: https://t.co/huedR0zZWG Username-pass combos:
Tweet card summary image
gist.github.com
Cisco Honeypot Bruteforce IPs 21-28 Oct 2025 . GitHub Gist: instantly share code, notes, and snippets.
0
8
32
@DefusedCyber
Defused
10 days
Actor exploiting multiple Fortinet Fortiweb honeypots from 185.253.163.82 πŸ‡ΊπŸ‡Έ( M247 Europe SRL ) VirusTotal Detections 0/95 🟒 The actor exploited CVE-2025-25257 on multiple Fortiweb honeypots, plus attempted logging in as administrator
0
2
10
@DefusedCyber
Defused
10 days
Tune in on Friday to @AtomicsonaFri for some Defused fun! 🍯
@AtomicsonaFri
AtomicsonaFriday
10 days
πŸŽƒ This Friday... something wicked logs in. We’re teaming up with the brilliant minds at @DefusedCyber for our Halloween special πŸ’€ We’ll resurrect real-world threats, view them live, and hunt their artifacts. https://t.co/B3kuKvoMyF
0
0
4